Free Essay

Nt1210 User-Profile

In:

Submitted By reaver28
Words 326
Pages 2
Ellery Corley
NT 1230
Wednesday
Unit 4. Exercise 1
User-Profile Scenario

From: Systems Administrator
To: Manager

I have reviewed your email inquiry and have the following recommendations.

1. Interns should not have the level of access that allows the changing of their workstations. Thus all interns will be combined into a group for restricted access. This group will be given standard access, not allowing for any changes to workstation unless authorized by System Administrator. This includes the changing of their password every 60 days. 2. Team leads need to have access to their files from any workstation. Thusly, all team leads will be assigned roaming user profiles. This will allow any team lead to access any work station at their convenience as long as the computer is on the network. This will also require team leads to lock or sign out of a work station when they are not using it. Due to the level of access and availability of said access, Team Lead passwords will be set to be changed every 30 days. 3. Since to Marketing Staff have dedicated work stations, they will be added to an ACL, and be designated user rights applicable to their needs. As System Admin, I do understand the need for access to applications, storage, the network, and the ability to change and customize as needed. Due to the level of access that the Marketing Staff will be assigned, they will be required to change their passwords every 30 days. They will be given a list of password protocols to follow when assigning their passwords. They will also be required to lock their work stations when not at their desks.
These system changes will take place by end of business today. Emails will be sent to all users affected by the changes outlining changes, protocols and requirements. Please direct any further questions or concerns directly to the System Administrator.

Thank you for your time,
Ellery Corley
System Administrator

Similar Documents

Free Essay

Social Networking

...Unfortunately, we live in a world where some individuals think that causing virtual aggravation and loss of time and money is entertaining and productive. Ever since we have been connected to the digital highway through internet access, computers have been vulnerable to malicious intrusion by programs that were designed with intent to do harm. The amount of money that organizations and consumers have spent in securing their computer data and company networks is overwhelming. Everyone can protect himself or herself by making sure they have a security plan in place by equipping the computers with the necessary defense mechanisms. Social Engineering Awareness: One of the major elements of a security plan is to increase the knowledge of the common user and to make sure they are aware of the risks and how to take precautions. Consumers must be aware of the different methods that are used in order to breach the security system in place. Surprisingly, many of the tactics are not very technical at all. It is very important to know whether or not the sites you are visiting are secure and how your data is being used while you are visiting these sites. One should definitely use extra caution when downloading files and even clicking on links. Consumers should also beware of direct social engineering tactics used to persuade you to willingly give your information to unauthorized individuals. Never share your passwords with anyone. Do not be willing to give out private information without...

Words: 661 - Pages: 3

Premium Essay

Nt11110T Lab 10 Research Project

...can determine the interaction itself. In shorter terms it’s the use of dedicated websites and applications to interact with other users, or to find people with similar interests to oneself. In today’s social networking refers to all activities that are carried out with-in specific online services that provides free space and software tools which allows you to create networks of people. In other words social networking is a Web site that allows individuals to construct a public or semi-public profile. The mechanism following: social networking services enable users to create a profile for themselves, by inserting their personal data. Users’ data are not only constituted by vital statistics, but they include a lot of other information which pertains to user hobbies, passions, interests, professional background and so on. This kind of personal data, all spontaneously provided by the user her/himself, permit to create interconnected networks of people who decide to put in common their interests and to have an online identity which fully describes them. The great strength of social networking are the multiple ways the users have to interact. Below is a list of the main communication resources used to build social networks: chat; messaging; wiki; email; video; voice; chat; All the technologies listed above are not new to the Web users who had been surfing the Web during the last ten years, but today we label “social networking sites” those which “reinvented”...

Words: 383 - Pages: 2

Premium Essay

Nt1230Unit4

...Complete the following exercise by matching the terms with their corresponding definitions. a. switches an account from the standard user token to the administrative token b. displayed when a regular user requires administrative access c. confirmation of a user’s identity d. suppresses the operation of all controls except the UAC prompt e. enables users to access their desktops from any workstation f. grants a user a specific degree of access to a resource g. hosts an AD DS domain h. displayed when an administrator requires administrative access i. placeholder for a collection of users with a similar characteristic j. a profile that multiple users can run simultaneously ___d. __ 1. credential prompt ___e.___ 2. roaming user profile ___a.___ 3. Admin Approval Mode ___i.___ 4. special identity ___c.___ 5. Authentication ___b.___ 6. elevation prompt ___f.____ 7. mandatory user profile ___d.____ 8. secure desktop ___h.____ 9. authorization ___g.____10. domain controller Multiple Choice Select one or more correct answers for each of the following questions. 1. What is the term used to describe a read-only copy of a user profile stored on a network share? a. mandatory profile 2. When you create a new user account with the User Accounts control panel, you can only add it to which of the following groups? (Choose all that apply.) a. Administrators d. Guests 3. When you log on to a newly installed Windows 7 computer for the first time, why...

Words: 436 - Pages: 2

Free Essay

Windows Xp Ch 7 -9 Review Questions

...Chapter Seven Lesson 1 Review 1. Where do local user accounts allow users to log on and gain access to resources? Answer: Only on the computer on which the local user account is created. 2. Where should you create user accounts for computers running Windows XP Professional that are part of a domain? Answer: You should create it on one of the domain controllers. You should not use local user accounts on Windows XP Professional computers that are part of a domain. 3. Which of the following statements about domain user accounts are correct? (Choose all that apply.) a. Domain user accounts allow users to log on to the domain and gain access to resources anywhere on the network, as long as the users have the required access permissions. b. If at least one computer on the network is configured as a domain controller, you should use domain user accounts only. c. The domain controller replicates the new user account information to all other computers in the domain. d. A new domain user account is established in the local security database on the domain controller on which you created the account. The correct answers are A and B. C is not correct because the domain controller replicates user account information only to other domain controllers in a domain—not to every computer. D is not correct because a domain user account is established in Active Directory, not in the local security database. A local user account is established in the local security database...

Words: 3929 - Pages: 16

Free Essay

Active Directory

...access to the key people or groups of people that need access to pertinent information. Secondly, by doing this we can activate a more secure password criteria. Making passwords of no less than eight characters long and they must contain a capital letter, a number, and a special character. These passwords will be set to renew anywhere from 30 – 90 days. The most common setting for this feature is 90 days. A notification will sent to the user 14 days prior to the password’s expiration and prompt the user to change their password. Thirdly, special access tokens will be used to insure the identity of the user. A smart card will be in place. This smart card slips into a slot and read a magnetic strip, a microchip that is imbedded into the card, or a by a bar code on the back of the card. Using the bar code will be the less expensive route to take. The CEO, CIO and the ISSO will choose user accounts. They will collaborate with one another to determine which users belong to which groups. From there each individual will be assigned to a user group. The workgroups to be created are: Accounting, Planning, and Purchasing. Each of these groups will be categorized upon importance to the company. The order will be accounting, purchasing and...

Words: 469 - Pages: 2

Premium Essay

Carpooling Term of Use

...Munich, represented by the managing directors, Dr. Michael Reinicke, Matthias Siedler or Stefan Weber (carpooling.com). These Terms of Use are divided into provisions for all users (Section I), special provisions for using the booking and payment system offered by carpooling.com (Section II) as well as general provisions (Section III). I. General 1. User group and conclusion of contract, free and premium membership 1.1 Users have the option to register on the website. Registration and maintenance of the usage agreement requires the user to hold a valid and permanently active email address. Furthermore, all information provided must be correct and complete, particularly with regard to the address. The provided information must be updated in the event of any changes. 1.2 The user may freely choose a username and password during the registration process. The user must keep the password secure and not grant third parties access to the website by using his or her user credentials. 1.3 The contract comes into force as soon as the user has submitted the registration form and carpooling.com has confirmed the registration by providing the user with an activation code, which is required for first-time login. 1.4 All services of the basic membership on the Mitfahrgelegenheit websites are made available to the user free of charge. The basic membership includes all offers on the Mitfahrgelegenheit websites that are not explicitly labelled as subject to charge. In addition, carpooling.com...

Words: 4975 - Pages: 20

Free Essay

User Profiling Based Adaptive Test Generation

...User Profiling based Adaptive Test Generation Assessment in E – Learning System Manan Jadhav Department of Computer Technology, VJTI Mumbai, India manan.jadhav@gmail.com Shagufta Rizwan Department of Master of Computer Application, VJTI Mumbai, India shaguftarjpt673@gmail.com Aditi Nehete Department of Computer Technology, VJTI Mumbai, India aditinehete@gmail.com Abstract — In this paper, we describe a User profiling based ELearning System with Adaptive Test Generation and Assessment. This system uses rule-based Intelligence Technique and implicit User Profiling to judge the proficiency level of the student and generates tests for them accordingly. More specifically it’s a Test Generation, Assessment and Remedial System where the student can give a test after he has completed studying a particular concept where the difficulty level of the test will be decided by the expert system engine. After the completion of the test, the system helps the student in improving the proficiency of the concept either if it is expected by the concept or if he faces difficulty in understanding the concept. Based on the type of errors made in the test, the Test Remedial System will help the student to improve in that domain of understanding of the concept. Every phase transition is rule-based which considers the user’s profile and the concept importance to make sure that he does well where it is required. Preliminary Experimental Implementations show that with User Profiling we can reduce the amount...

Words: 4578 - Pages: 19

Premium Essay

User Settings

...issues the supervisor is complaining about. The way I can help fix the issues is by assigning each user to a profile type and adjust the user control settings for each user and assign them to a group that the supervisor will have some control over. The first thing I will need is to get a list of each user and what their job is. Second I will need to get a list of what groups you would like to create so we can create them to give each user the access they need for doing their job. The interns that are temporary user will we give them a mandatory profile as a standard user. By doing this we will have a set profile setting that is downloaded each time the user logs on to their account. Also by being a standard user they will have very limited access to change the desktop, and what they can change will not be saved to the server and when they log on again it will be set to the standard settings. When we assign each user to a group that will give them what they need to access to do their job. As for the Team leads we will give them a roaming user profile, which will allow them to be able to log on to any computer and have the same desktop settings and programs on each computer. We will also give them access to each of the groups that they need to complete their jobs. This should give them the access they need. As for the marketing staff we will give them a local user profile with expand rights so they can modify their workstation to their liking. They will only have access...

Words: 341 - Pages: 2

Premium Essay

Nt1230 Syllabus

...ITT Technical Institute NT1230 Client-Server Networking I Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite or Corerequisite: NT1210 Introduction to Networking or equivalent Course Description: This course introduces operating principles for the client-server based networking systems. Students will examine processes and procedures involving the installation, configuration, maintanence, troublshooting and routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course...

Words: 1834 - Pages: 8

Premium Essay

Test

...core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone Project IS4550 NT2640 Security Policies and Implementation IP NT2640 Networking IP Networking PT2520...

Words: 2305 - Pages: 10